Configuring Security. Configuring User Access CHAPTER

Size: px
Start display at page:

Download "Configuring Security. Configuring User Access CHAPTER"

Transcription

1 2 CHAPTER Before you set up your server for discovering, monitoring, and configuring your Cisco network, you need to make some decisions about the level of security you desire in your network management. With the Cisco Mobile Wireless Transport Manager (MWTM), you can determine how you want users to authenticate, whether you want encrypted data between the application client and the server, and if you want to limit client access to specific IP addresses. This chapter provides information about configuring MWTM security and limiting access to the MWTM. This chapter contains: Configuring User Access, page 2-1 Implementing SSL Support in the MWTM, page 2-21 Limiting MWTM Client Access to the MWTM Server (Server Only), page 2-29 Backing Up or Restoring MWTM Files (Server Only), page 2-30 Removing MWTM Data from the MWTM Server, page 2-32 Configuring User Access You can use the MWTM to control who is allowed to do what in the MWTM, beyond simply specifying root and non root users. The MWTM calls this ability user-based access. User-based access provides multilevel, password-protected access to MWTM features. Each user can have a unique username and password. You can also assign each user to one of five levels of access, which control the list of MWTM features accessible by that user. To configure MWTM user access, perform the tasks in the following sections. Required and optional tasks are indicated: Required: Implementing Secure User Access (Server Only), page 2-2 Creating Secure Passwords, page 2-7 Configuring MWTM User Account Levels (Server Only), page

2 Configuring User Access Chapter 2 Optional: Automatically Disabling Users and Passwords (Server Only), page 2-10 Manually Disabling Users and Passwords (Server Only), page 2-12 Enabling and Changing Users and Passwords (Server Only), page 2-13 Displaying a Message of the Day, page 2-15 Manually Synchronizing Local MWTM Passwords (Server Only), page 2-16 Listing All Currently Defined Users (Server Only), page 2-16 Displaying the Contents of the System Security Log (Server Only), page 2-17 Restoring Security-Related MWTM Data (Server Only), page 2-18 Disabling MWTM User-Based Access (Server Only), page 2-18 Specifying a Super User (Server Only), page 2-19 Implementing Secure User Access (Server Only) Before you can access the full suite of security commands in the MWTM, you must enable MWTM user access, configure the type of security authentication you want, and add users to your user lists. After you implement user access for the MWTM, users must log in to the system to access the: MWTM client interface MWTM web interface Event Editor Global Title Translation (GTT) Editor (ITP only) Address Table Editor (ITP only) After you implement MWTM user access, if a user logs in on one client, then logs in on a second client, the MWTM closes the first client and records the event in the system security log. Security Authentication Two types of security authentication are possible: Local authentication: You can create user accounts and passwords that are local to the MWTM system. When using this method, you can use MWTM user access commands to manage usernames, passwords, and access levels. Solaris/Linux authentication: Uses standard Solaris- or Linux-based user accounts and passwords, as specified in the /etc/nsswitch.conf file. You can provide authentication using the local /etc/passwd file; a distributed Network Information Services (NIS) system; or any other type of authentication tool (for details, see Additional Authentication Tools, page 2-4). You can use all MWTM user access commands except: mwtm disablepass mwtm passwordage mwtm userpass 2-2

3 Chapter 2 Configuring User Access In addition, if you have enabled Solaris/Linux authentication, you must be logged in as the root user, not as a superuser, to use: mwtm adduser mwtm updateuser mwtm authtype PAM Setup to Check Library Version and JVM Versions To ensure Java Virtual Machine (JVM) version and available Pluggable Authentication Modules (PAM) library matches: If your Operating System only has 32-bit version of the PAM library, then you need to make sure to use 32-bit JVM. If your Operating System only has 64-bit version of the PAM library, then you need to make sure to use 64-bit JVM. If your Operating System has both 32-bit and 64-bit versions of PAM libraries, then you can use either 32-bit or 64-bit JVM. To check the available PAM authentication module versions: To check PAM authentication module version on Solaris: file /usr/lib/security/pam_radius_auth.so file /usr/lib/security/sparcv9/pam_radius_auth.so To check PAM authentication module version on Linux: file /lib/security/pam_radius_auth.so file /lib64/security/pam_radius_auth.so To check JVM versions, go to: /opt/cscosgm/j2re/jre/bin/java -version To change the JVM version on Solaris: On Solaris, MWTM has both 32-bit and 64-bit JVM versions. By default, the MWTM and above enables 64-bit JVM on Solaris. To change JVM to 32-bit version, enter the following commands: % cd /opt/cscosgm/j2re/jre/bin % mv java.sgm java.64 % mv java.32 java.sgm % /opt/cscosgm/bin/mwtm restart To check if the JVM version is changed successfully, go to: /opt/cscosgm/j2re/jre/bin/java -version To check the JVM version on Linux: For Linux, you cannot change JVM versions. MWTM installation program installs 64-bit JVM if the Linux runs 64-bit kernel. MWTM installation program installs 32-bit JVM if the Linux runs 32-bit kernel. You need to ensure that proper version of PAM library is available on Linux that matches the kernel version. 2-3

4 Configuring User Access Chapter 2 Additional Authentication Tools With the introduction of Pluggable Authentication Modules (PAM) in MWTM 6.1, you can use additional authentication tools, such as Remote Authentication Dial In User Service (RADIUS) or Terminal Access Controller Access-Control System (TACACS+). For example, if you want to use RADIUS, follow these steps: Step 1 Ensure that you have: Selected Solaris or Linux authentication, either during installation or using the mwtm authtype command (see mwtm authtype, page B-8) Download and compile the PAM radius module from the internet ( Check the install subdirectory of the MWTM installation CD image for the notes - INSTALL.pam_radius.txt (for PAM RADIUS module) or INSTALL.pam_tacplus.txt (for TACPLUS module) and precompiled PAM modules. On the MWTM server, copy the PAM radius file (pam_radius_auth.so) you downloaded to the /usr/lib/security directory. For Solaris authentication: a. On the MWTM server, using a text editor, open this file: /etc/pam.conf b. Modify these lines: mwtm-jpam auth required pam_unix_auth.so mwtm-jpam account required pam_unix_account.so to: mwtm-jpam auth required pam_radius_auth.so mwtm-jpam account required pam_radius_auth.so For Linux authentication: a. On the MWTM server, using a text editor, open this file: /etc/pam.d/mwtm-jpam b. Modify these lines (for 32 or 64-bit, respectively): auth required /lib/security/pam_unix_auth.so account required /lib/security/pam_unix_auth.so or auth required /lib64/security/pam_unix_auth.so account required /lib64/security/pam_unix_auth.so to: auth required /lib/security/pam_radius_auth.so account required /lib/security/pam_radius_auth.so or auth required /lib64/security/pam_radius_auth.so account required /lib64/security/pam_radius_auth.so Step 4 Enter: cd /etc 2-4

5 Chapter 2 Configuring User Access Step 5 Step 6 Step 7 Create the following directory: raddb. You should have a PAM configuration file named pam_radius_auth.conf. Copy this file as server in the /etc/raddb/ directory. Configure the server file you just created with the actual Radius server, port number, and the secret password. For example: :1812 secret 3 If a MWTM superuser is defined, user access is enabled with authtype set to solaris or linux, and user accounts for accessing MWTM are maintained locally on the host running the MWTM server, then /etc/shadow must be readable by the MWTM superuser account: chown superuser /etc/shadow where superuser is the name of the MWTM superuser account. See for the details on PAM_TACPLUS module. Configuring User Levels You can configure one of seven account levels for each user. Valid levels are: 1. Basic User (Level 1) Access 2. Power User (Level 2) Access 3. Network Operator (Level 3) Access 4. Network Administrator (Level 4) Access 5. System Administrator (Level 5) Access 6. Custom User Level 1 (Level 11) Access 7. Custom User Level 2 (Level 12) Access For more information about account levels, see Configuring MWTM User Account Levels (Server Only), page 2-7. Configuring User Passwords The method that you use for setting user passwords depends on the type of authentication that you configure on the MWTM system (local or solaris). Local Authentication If mwtm authtype is set to local, the MWTM prompts you to: Enter the user password. When setting the password, follow the rules and considerations in Creating Secure Passwords, page 2-7. Force the user to change the password at the next login. The default is to not force the user to change the password. Whenever a user must change a password, the MWTM issues an appropriate message, and prompts for the username and new password. 2-5

6 Configuring User Access Chapter 2 Solaris/Linux Authentication If mwtm authtype is set to solaris or linux, users cannot change their passwords by using the MWTM client. Instead, they must manage their passwords on the external authentication servers by using Solaris or Linux commands, such as passwd. All new passwords take effect the next time the MWTM automatically synchronizes local MWTM passwords with Solaris or Linux. You can manually synchronize passwords at any time by using the mwtm syncusers command. For more information, see mwtm syncusers, page B-86. Enabling Secure User Access To enable secure user access for the MWTM: Step 1 Log in to the MWTM server as the root user (see Starting the MWTM Client, page 3-3). To enable MWTM security, the following prerequisites must be met: User access must be enabled. The authentication type must be set. Users must be added. The mwtm useraccess enable command takes you through all three stages, checking the status of: 1. mwtm useraccess Enabled or disabled. 2. mwtm authtype If you have not already set the mwtm authentication type, you must do so now. 3. mwtm adduser If you have already assigned users, the MWTM asks if you want to use the same user database, or create a new one. If you have not assigned users, you must do so now. Tip For details on the mwtm useraccess, mwtm authtype, and mwtm adduser commands, see Appendix B, Command Reference. Run the mwtm useraccess enable command: cd /opt/cscosgm/bin./mwtm useraccess enable ~text elided~ To activate your security changes on the MWTM client, restart the MWTM server with the mwtm restart command (see mwtm restart, page B-58). To activate your security changes on the MWTM web interface, clear the browser cache and restart the browser. Use the remaining procedures in this chapter to further customize your MWTM security system. 2-6

7 Chapter 2 Configuring User Access Creating Secure Passwords When setting passwords in the MWTM, the: Password must be at least 6 characters, up to 15 characters. Password cannot be identical to the username. New password cannot be the same as the old password. MWTM does not allow users to switch back and forth between two passwords. Password cannot be a commonly used word. The MWTM server uses the system dictionary at /usr/share/lib/dict/words (Solaris) or /usr/share/dict/words (Linux) to determine whether a word is a commonly used word. To use your own dictionary, add a line to the System.properties file: To disable the MWTM dictionary and allow common words, add: DICT_FILE=/dev/null To use a custom dictionary, add: DICT_FILE=/new-dictionary where new-dictionary is the path and filename of the custom dictionary file, such as /users/usr11/words. Each line in the custom dictionary must contain a single word, with no leading or trailing spaces. Configuring MWTM User Account Levels (Server Only) This section describes the user account levels, and the MWTM client and web interface actions that are available at each level: Basic User (Level 1) Access, page 2-8 Power User (Level 2) Access, page 2-8 Network Operator (Level 3) Access, page 2-9 Network Administrator (Level 4) Access, page 2-9 System Administrator (Level 5) Access, page 2-9 Custom User Level 1 (Level 11) Access, page 2-10 Custom User Level 2 (Level 12) Access, page 2-10 The account level that includes an action is the lowest level with access to that action. The action is also available to all higher account levels. For example, a System Administrator also has access to all Network Administrator actions. Account levels are based on the action to be performed, not on the target network element. Therefore, if a user can perform an action on one MWTM network element (such as deleting a node), the user can perform the same action on all similar MWTM network elements (such as deleting an interface, signaling point, or linkset). Access to MWTM information and downloads on Cisco.com is already protected by Cisco.com, and is not protected by the MWTM. 2-7

8 Configuring User Access Chapter 2 To configure the account level for a user, use the mwtm adduser command, as described in Implementing Secure User Access (Server Only), page 2-2, or the mwtm updateuser or mwtm newlevel commands, as described in Enabling and Changing Users and Passwords (Server Only), page Basic User (Level 1) Access Basic users can view MWTM data, load MWTM files, and use MWTM drill-down menus. The following MWTM actions in the client and web interfaces are available to basic users: MWTM Client Interface Actions View the MWTM web interface homepage Connect to a new server Apply changes to views Load the DEFAULT view and existing views, but cannot save them View and edit preferences View and manipulate the topology map, save it as a JPEG, but cannot save icon locations View network elements, events, details, and notes Load existing event filters, but cannot save them Print MWTM windows Launch CiscoWorks MWTM Web Interface Actions View the MWTM web interface homepage View the following administrative pages: System Information System Status View and edit web preferences View reports Power User (Level 2) Access The following MWTM actions in the client and web interfaces are available to power users: MWTM Client Interface Actions Access all basic (Level 1) user client actions Acknowledge events View, change, and save event configurations, but cannot deploy changes View real-time data and graphs Edit network elements, events, and views Unignore network elements and views Save preferences files, event filters, and views MWTM Web Interface Actions Access all basic (Level 1) user web actions Acknowledge events View event configurations View real-time statistics Delete alarms Modify alarm severity Edit groups Edit notes 2-8

9 Chapter 2 Configuring User Access Network Operator (Level 3) Access The following MWTM actions in the client and web interfaces are available to network operators: MWTM Client Interface Actions Access all basic (Level 1) user and power (Level 2) user client actions Access troubleshooting features Ignore/Unignore network elements and views Poll nodes Access nodes through Telnet or SSH (ITP only) View route table files and GTT files, but cannot edit them MWTM Web Interface Actions Access all basic (Level 1) user and power (Level 2) user web actions Access troubleshooting features Access provisioning features Access all features on Administrative pages Network Administrator (Level 4) Access The following MWTM actions in the client and web interfaces are available to network administrators: MWTM Client Interface Actions Accessing all basic (Level 1) user, power (Level 2) user, and network operator (Level 3) client actions Modify and view SNMP configuration Perform network discovery Delete network elements Unmanage nodes (ITP only) Edit and save route table files, GTT files, and address table files (ITP only) Use the deployment wizard MWTM Web Interface Actions Accessing all basic (Level 1) user, power (Level 2) user, and network operator (Level 3) web actions Automatically log into SSH terminal in enable mode (if enable password is set) System Administrator (Level 5) Access The following MWTM actions in the client and web interfaces are available to system administrators: MWTM Client Interface Actions Accessing all basic (Level 1) user, power (Level 2) user, network operator (Level 3), and network administrator (Level 4) client actions Access and modify trap settings Manage/Unmanage nodes Deploy saved event configuration changes MWTM Web Interface Actions Accessing all basic (Level 1) user, power (Level 2) user, network operator (Level 3), and network administrator (Level 4) web actions Access and modify trap settings Enable and disable reports (MSU Rates) 2-9

10 Configuring User Access Chapter 2 Custom User Level 1 (Level 11) Access The following MWTM actions in the client and web interfaces are available for custom user level 1 users: MWTM Client Interface Actions Customizing all basic (Level 1) user, power (Level 2) user, network operator (Level 3), network administrator (Level 4), and system administrator (Level 5) client actions. MWTM Web Interface Actions Customizing all basic (Level 1) user, power (Level 2) user, network operator (Level 3), network administrator (Level 4), and system administrator web actions. Custom User Level 2 (Level 12) Access The following MWTM actions in the client and web interfaces are available for custom user level 2 users: MWTM Client Interface Actions Customizing all basic (Level 1) user, power (Level 2) user, network operator (Level 3), network administrator (Level 4), and system administrator (Level 5) client actions. MWTM Web Interface Actions Customizing all basic (Level 1) user, power (Level 2) user, network operator (Level 3), network administrator (Level 4), and system administrator (Level 5) web actions. Automatically Disabling Users and Passwords (Server Only) After you have implemented the basic MWTM security system, you can customize the system to automatically disable users and passwords when certain conditions are met (for example, a series of unsuccessful login attempts or a specified period of inactivity). Tip To view a list of current users and the status of user accounts, use the mwtm listusers command (see mwtm listusers, page B-43). To automatically disable users and passwords: Step 1 Log in to the MWTM server as the root or superuser: Root user See Becoming the Root User (Server Only), page 3-2 Super user See Specifying a Super User (Server Only), page 2-19 Enter the following command: cd /opt/cscosgm/bin (Optional) To configure the MWTM to generate an alarm after a specified number of unsuccessful login attempts by a user, enter:./mwtm badloginalarm number-of-attempts where number-of-attempts is the number of unsuccessful login attempts allowed before the MWTM generates an alarm. The valid range is 1 unsuccessful attempt to an unlimited number of unsuccessful attempts. The default value is 5 unsuccessful attempts. 2-10

11 Chapter 2 Configuring User Access To disable this action (that is, to prevent the MWTM from automatically generating an alarm after unsuccessful login attempts), enter:./mwtm badloginalarm clear Step 4 (Optional) To configure the MWTM to disable a user s account automatically after a specified number of unsuccessful login attempts, enter: #./mwtm badlogindisable number-of-attempts where number-of-attempts is the number of unsuccessful login attempts allowed before the MWTM disables the user s account. The MWTM does not delete the user from the user list, the MWTM only disables the user s account. The valid range is 1 unsuccessful attempt to an unlimited number of unsuccessful attempts. The default value is 10 unsuccessful attempts. To re-enable the user s account, use the mwtm enableuser command. To disable this action (that is, to prevent the MWTM from automatically disabling a user s account after unsuccessful login attempts), enter: #./mwtm badlogindisable clear Step 5 (Optional) The MWTM keeps track of the date and time each user last logged in. To configure the MWTM to disable a user s log in automatically after a specified number of days of inactivity, enter: #./mwtm inactiveuserdays number-of-days where number-of-days is the number of days that a user can be inactive before the MWTM disables the user s account. The MWTM does not delete the user from the user list, the MWTM only disables the user s account. The valid range is 1 day to an unlimited number of days. There is no default setting. To re-enable the user s account, use the mwtm enableuser command. This action is disabled by default. If you do not specify the mwtm inactiveuserdays command, user accounts are never disabled as a result of inactivity. If you have enabled this action and you want to disable it (that is, to prevent the MWTM from automatically disabling user accounts as a result of inactivity), enter: #./mwtm inactiveuserdays clear Step 6 (Optional) If mwtm authtype is set to local, you can configure the MWTM to force users to change their passwords after a specified number of days. To configure the MWTM to force users to change their passwords after a specified number of days, enter: #./mwtm passwordage number-of-days where number-of-days is the number of days allowed before users must change their passwords. You must have changed your password at least once for the mwtm passwordage command to properly age the password. The valid range is 1 day to an unlimited number of days. There is no default setting. 2-11

12 Configuring User Access Chapter 2 The MWTM starts password aging at midnight on the day that you set the value. For example, if you use the mwtm passwordage command to set the password age to 1 day (24 hours), the password begins to age at midnight and expires 24 hours later. This action is disabled by default. If you do not specify the mwtm passwordage command, users never need to change their passwords. If you have enabled this action and you want to disable it (that is, prevent the MWTM from forcing users to change passwords), enter: #./mwtm passwordage clear If mwtm authtype is set to solaris or linux, you cannot use the mwtm passwordage command. Instead, you must manage passwords on the external authentication servers. Step 7 (Optional) To configure the MWTM to automatically disconnect a client (this includes the MWTM client, the GTT editor, and the address table editor) after a specified number of minutes of inactivity, enter: #./mwtm clitimeout number-of-minutes where number-of-minutes is the number of minutes a client can be inactive before the MWTM disconnects the client. The valid range is 1 minute to an unlimited number of minutes. There is no default value. This action is disabled by default. If you do not specify the mwtm clitimeout command, clients are never disconnected as a result of inactivity. If you have enabled this action and you want to disable it (that is, never disconnect a client as a result of inactivity), enter the following command: #./mwtm clitimeout clear Manually Disabling Users and Passwords (Server Only) As described in the Automatically Disabling Users and Passwords (Server Only), page 2-10, you can customize the MWTM to automatically disable users and passwords when certain conditions are met. However, you can also manually disable MWTM users and passwords whenever you suspect a security breech has occurred. To disable MWTM users and passwords: Step 1 Log in to the MWTM server as the root or superuser: Root user See Starting the MWTM Client, page 3-3 Super user See Specifying a Super User (Server Only), page 2-19 Enter: # cd /opt/cscosgm/bin 2-12

13 Chapter 2 Configuring User Access Step 4 (Optional) To delete a user entirely from the MWTM user access account list, enter: #./mwtm deluser username where username is the name of the user. If you later decide to add the user back to the account list, you must use the mwtm adduser command. (Optional) If mwtm authtype is set to local, you can disable a user s password. To disable a user s password, enter: #./mwtm disablepass username where username is the name of the user. The MWTM does not delete the user from the account list, the MWTM only disables the user s password. If mwtm authtype is set to solaris or linux, you cannot use the mwtm disablepass command. Instead, you must manage passwords on the external authentication servers. Step 5 The user must change the password the next time he or she logs in. You can also re-enable the user s account with the same password, or with a new password: To re-enable the user s account with the same password as before, use the mwtm enableuser command. To re-enable the user s account with a new password, use the mwtm userpass command. (Optional) To disable a user s account, but not the user s password, enter: #./mwtm disableuser username where username is the name of the user. If mwtm authtype is set to solaris or linux, you must be logged in as the root user, not as a superuser, to enter this command. The MWTM does not delete the user from the account list; the MWTM only disables the user s account. The user cannot log in until you re-enable the user s account: To re-enable the user s account with the same password as before, use the mwtm enableuser command. To re-enable the user s account with a new password, use the mwtm userpass command. Enabling and Changing Users and Passwords (Server Only) Of course, the MWTM also enables you to re-enable users and passwords, and change user accounts. To enable and change users and passwords: Step 1 Log in to the MWTM server as the root or superuser: Root user See Starting the MWTM Client, page 3-3 Super user See Specifying a Super User (Server Only), page

14 Configuring User Access Chapter 2 Enter the following command: # cd /opt/cscosgm/bin (Optional) To re-enable a user s account, which had been disabled either automatically by the MWTM or by a superuser, enter the following command: #./mwtm enableuser username where username is the name of the user. The MWTM re-enables the user s account with the same password as before. If mwtm authtype is set to solaris or linux, you must be logged in as the root user, not as a superuser, to enter this command. Step 4 (Optional) If mwtm authtype is set to local, you can change a user s password, or re-enable the user s account with a new password, if the user s account had been disabled either automatically by the MWTM or by a superuser. To change a password or to re-enable a user s account with a new password, enter: #./mwtm userpass username where username is the name of the user. The MWTM prompts you for the new password. When setting the password, follow the rules and considerations in the Creating Secure Passwords, page 2-7. If the user s account has also been disabled, the MWTM re-enables the user s account with the new password. If mwtm authtype is set to solaris or linux, you cannot use the mwtm userpass command. Instead, you must manage passwords on the external authentication servers. Step 5 (Optional) To change a user s account level and password, enter the following command: #./mwtm updateuser username where username is the name of the user. If mwtm authtype is set to solaris or linux, you must be logged in as the root user, not as a superuser, to enter this command. Step 6 The MWTM prompts you for the new account level. Valid levels are described in Configuring User Levels, page 2-5: If mwtm authtype is set to local, the MWTM also prompts you for the user s new password. When setting the password, follow the rules and considerations in Creating Secure Passwords, page 2-7. (Optional) To change a user s account level, but not the user s password, enter the following command: #./mwtm newlevel username where username is the name of the user. The MWTM prompts you for the new account level. Valid levels are described in Configuring User Levels, page

15 Chapter 2 Configuring User Access Displaying a Message of the Day You can use the MWTM to display a user-specified MWTM system notice called the message of the day. You can use the message of the day to inform users of important changes or events in the MWTM system. The message of the day also gives users an opportunity to exit the MWTM client, Event Editor, GTT Editor (ITP only), or Address Table Editor (ITP only) before starting them. If you enable the message of the day, it appears whenever a user attempts to launch a client. If the user accepts the message, the client launches. If the user declines the message, the client does not launch. To display the Message of the Day dialog, use one of the following procedures: Launch a client. If there is a message of the day, the Message of the Day dialog appears. Launch MWTM web client. Choose Administrative > System Information > Message of the Day. This link appears only after enabling message of the day using the command mwtm motd. Choose View > Message of the Day from the MWTM main menu (in case of Java client). Select the MWTM server name in the lower-right corner of the MWTM main window. The Message of the Day dialog contains the following fields: Field or Button Message of the Day Last Updated Message Field Accept Decline OK Description Date and time the message of the day was last updated. If there is no message of the day, the MWTM displays Unknown. Text of the message of the day. If there is no message of the day, the MWTM displays There is no message of the day. Closes the Message of the Day dialog and launches the client. If you do not click Accept, you cannot launch the client. This button is available when there is a message of the day and you launch a client. Closes the Message of the Day dialog and exits the client. This button is available when there is a message of the day and you launch a client. Closes the Message of the Day dialog without exiting the client. This button is available if you displayed the Message of the Day dialog by choosing View > Message of the Day from the MWTM main menu. The OK button is not available in web client. To configure the MWTM to display a message of the day: Step 1 Log in to the MWTM server as the root or superuser: Root user See Starting the MWTM Client, page 3-3 Super user See Specifying a Super User (Server Only), page 2-19 Enter the following commands: cd /opt/cscosgm/bin./mwtm motd enable The MWTM displays: 2-15

16 Configuring User Access Chapter 2 Enter location of the message of the day file: [/opt/cscosgm/etc/motd] Step 4 Step 5 Step 6 To accept the default value, press Enter; or type a different location and press Enter. The MWTM displays: Setting Message of the Day File to: [/opt/cscosgm/etc/motd] Message of the Day File set to: [/opt/cscosgm/etc/motd] MWTM server must be restarted for changes to take effect. To create the message text (the first time) or edit the existing text, enter:./mwtm motd edit To display the contents of the message of the day file, enter:./mwtm motd cat To disable the message of the day file, enter:./mwtm motd disable Manually Synchronizing Local MWTM Passwords (Server Only) If mwtm authtype is set to solaris or linux, the MWTM automatically synchronizes local MWTM passwords with the operating system at 1:30 a.m. each night (this setting can be changed using the root crontab). However, you can also manually synchronize passwords at any time. To manually synchronize local MWTM passwords: Step 1 Log in to the MWTM server as the root or superuser: Root user See Starting the MWTM Client, page 3-3 Super user See Specifying a Super User (Server Only), page 2-19 Change to the /bin directory: cd /opt/cscosgm/bin Synchronize the MWTM passwords:./mwtm syncusers The MWTM synchronizes the passwords with Solaris. Listing All Currently Defined Users (Server Only) To list all currently defined users in the MWTM User-Based Access account list: Step 1 Log in to the MWTM server as the root or superuser: Root user See Starting the MWTM Client, page 3-3 Super user See Specifying a Super User (Server Only), page

17 Chapter 2 Configuring User Access Step 4 Change to the /bin directory: cd /opt/cscosgm/bin List all users:./mwtm listusers The MWTM displays the following information for each user: Username Last time the user logged in User s account access level User s current account status, such as Account Enabled or Password Disabled To list information for a specific user, enter:./mwtm listusers username where username is the name of the user. You can also view user account information on the MWTM User Accounts web page. Displaying the Contents of the System Security Log (Server Only) To display the contents of the system security log with PAGER: Step 1 Log in to the MWTM server as the root or superuser: Root user See Starting the MWTM Client, page 3-3 Super user See Specifying a Super User (Server Only), page 2-19 Change to the /bin directory: cd /opt/cscosgm/bin Display the security log contents:./mwtm seclog The following security events are recorded in the log: All changes to system security, including adding users Login attempts, whether successful or unsuccessful, and logoffs Attempts to switch to another user's account, whether successful or unsuccessful Attempts to access files or resources of higher account level Access to all privileged files and processes Operating system configuration changes and program changes, at the Solaris level MWTM restarts Failures of computers, programs, communications, and operations, at the Solaris level 2-17

18 Configuring User Access Chapter 2 Step 4 To clear the log, enter:./mwtm seclog clear The default path and filename for the system security log file is /opt/cscosgm/logs/sgmsecuritylog.txt. If you installed the MWTM in a directory other than /opt, then the system security log file is located in that directory. You can also view the system security log on the MWTM System Security Log web page. For more information, see Viewing the Security Log, page Restoring Security-Related MWTM Data (Server Only) If you inadvertently delete your user accounts, or make other unwanted changes to your MWTM security information, the MWTM can restore the security-related parts of the MWTM data files from the previous night s backup. To restore the security-related MWTM data files: Step 1 Log in as the root user (for details see Starting the MWTM Client, page 3-3). Change to the /bin directory: cd /opt/cscosgm/bin Restore the security-related data:./mwtm restore security The MWTM restores the data. Disabling MWTM User-Based Access (Server Only) To completely disable MWTM User-Based Access: Step 1 Log in to the MWTM server as the root or superuser: Root user See Starting the MWTM Client, page 3-3 Super user See Specifying a Super User (Server Only), page 2-19 Change to the /bin directory: cd /opt/cscosgm/bin Disable user-based access:./mwtm useraccess disable 2-18

19 Chapter 2 Configuring User Access The MWTM user access is disabled the next time you restart the MWTM server (using the mwtm restart command). Specifying a Super User (Server Only) You can use the MWTM to specify a superuser. A superuser can perform most actions that otherwise require the user to be logged in as the root user. (The root user can still perform those actions, too.) If you specify a superuser, the server also runs as the superuser and not as the root user. Caution As a superuser, you can adversely affect your operating environment if you are unaware of the effects of the commands that you use. If you are a relatively inexperienced UNIX user, limit your activities as a superuser to the tasks described in this document. When you specify a superuser, remember that: The user must exist in the local /etc/passwd file. You cannot specify a user that is defined in a distributed Network Information Services (NIS) system. The superuser does not have access to all MWTM commands; you must still be logged in as the root user to enter certain commands. You must still be logged in as the root user to enter the following commands: mwtm authtype mwtm backup mwtm backupdir mwtm browserpath mwtm certgui mwtm certtool mwtm clean mwtm cleanall mwtm cleandb mwtm cwsetup mwtm evilstop mwtm jspport mwtm keytool mwtm killclients mwtm reboot mwtm restore mwtm restoreprops mwtm setpath, if you are specifying a username mwtm sounddir mwtm ssl 2-19

20 Configuring User Access Chapter 2 mwtm stopclients mwtm superuser mwtm syncusers mwtm termproxy mwtm trapsetup mwtm uninstall mwtm webport mwtm xtermpath If the mwtm authtype is set to solaris or linux, you must still be logged in as the root user to enter the following commands: mwtm adduser mwtm disablepass mwtm passwordage mwtm updateuser mwtm userpass If the SNMP trap port number on the MWTM server is less than 1024, you cannot use the mwtm superuser command. To correct this situation, you must specify a new SNMP trap port number that is greater than 1024: To change the SNMP trap port number in the nodes in your network, use the snmp-server host command. By default, the MWTM listens for traps from trap multiplexing nodes and NMS applications on port 44750, so that is a good port number to choose. The SNMP trap port number must be the same on all nodes in your network. For more information, see the description of the snmp-server host command in the Node Requirements section of the Installation Guide for the Cisco Mobile Wireless Transport Manager Use the mwtm trapsetup command to change the SNMP trap port number in the MWTM server to match the port number in the nodes in your network. For more information, see mwtm trapsetup, page B-89. To specify a superuser on the MWTM server: Step 1 Log in as the root user (see Becoming the Root User (Server Only), page 3-2). Change to the /bin directory: cd /opt/cscosgm/bin Specify the superuser:./mwtm superuser username where username is the name of the user. 2-20

21 Chapter 2 Implementing SSL Support in the MWTM Implementing SSL Support in the MWTM If you chose the Solaris or Linux authentication options (during installation or through the mwtm authtype command) you must enable SSL. For details on the mwtm authtype command, see mwtm authtype, page B-8. You can implement Secure Sockets Layer (SSL) support in your MWTM system. When you do, the MWTM uses secure sockets to encrypt all communication between the MWTM clients and server. This section includes the following information: Enabling SSL Support on the MWTM Server, page 2-21 Downloading the MWTM SSL Module for Windows Using the Web Interface, page 2-23 Downloading the Self-Signed SSL Certificate from the MWTM Server, page 2-23 Launching the MWTM Certificate Tool for SSL, page 2-24 Exporting an SSL Certificate, page 2-26 Viewing Detailed Information About a SSL Certificate, page 2-26 Managing SSL Support in the MWTM, page 2-27 Disabling SSL Support in the MWTM, page 2-28 Enabling SSL Support on the MWTM Server To enable SSL support in the MWTM, perform the following: Step 1 Install an SSL key/certificate pair in the MWTM by using one of the following procedures: To install a new SSL key and a self-signed certificate, generate the key and certificate by logging in as the root user on the MWTM server and entering the mwtm keytool genkey command. The MWTM stops the MWTM server and these prompts appear: Country Name (2 letter code) []: State or Province Name (full name) []: Locality Name (eg, city) []: Organization Name (eg, company) []: Organizational Unit Name (eg, section) []: Common Name (your hostname) []: Address []: Certificate Validity (number of days)? [min: 30, default: 365] Enter the requested information. The MWTM generates the following files: /opt/cscosgm/etc/ssl/server.key is the MWTM server s private key. Ensure that unauthorized personnel cannot access this key. /opt/cscosgm/etc/ssl/server.crt is the self-signed SSL certificate. /opt/cscosgm/etc/ssl/server.csr is a certificate signing request (CSR). It is not used if you are using a self-signed SSL certificate. 2-21

22 Implementing SSL Support in the MWTM Chapter 2 To install a new SSL key and a certificate signed by a certificate authority (CA), generate the key and a CSR by logging in as the root user on the MWTM server and entering the mwtm keytool genkey command. The MWTM stops the MWTM server and issues the following prompts: Country Name (2 letter code) []: State or Province Name (full name) []: Locality Name (eg, city) []: Organization Name (eg, company) []: Organizational Unit Name (eg, section) []: Common Name (your hostname) []: Address []: Certificate Validity (number of days)? [min: 30, default: 365] Enter the requested information. The MWTM generates the following files: /opt/cscosgm/etc/ssl/server.key is the MWTM server s private key. Ensure that unauthorized personnel cannot access this key. /opt/cscosgm/etc/ssl/server.csr is a CSR. /opt/cscosgm/etc/ssl/server.crt is the self-signed SSL certificate. It is not used if you are using a CA-signed SSL certificate; the CA-signed certificate overrides the self-signed certificate. Print the CSR in X.509 format, by logging in as the root user on the MWTM server and entering the mwtm keytool print_csr command. Send the CSR to a CA to be signed. After the CA signs the certificate, log in as the root user on the MWTM server and enter the following command:./mwtm keytool import_cert cert_filename where cert_filename is the name of the signed certificate. The MWTM stops the MWTM server and imports the certificate in X.509 format. To use an existing signed key/certificate pair, log in as the root user on the MWTM server and enter the following command:./mwtm keytool import_key key_filename cert_filename Step 4 where key_filename is the name of the existing SSL key and cert_filename is the name of the existing signed certificate. The MWTM stops the MWTM server and imports the SSL key in OpenSSL format and the signed SSL certificate in X.509 format. Enable SSL support in the MWTM, by logging in as the root user on the MWTM server and entering the mwtm ssl enable command. Restart the MWTM server. Set up the MWTM client-side SSL certificate trust relationship by downloading and importing the self-signed or CA-signed certificate on every remote MWTM client, Windows as well as Solaris, that connects to the MWTM server. a. (Self-signed certificate only) Download the self-signed certificate (server.crt) by using the procedure in Downloading the Self-Signed SSL Certificate from the MWTM Server, page b. Import the self-signed or CA-signed certificate by using the procedure in Launching the MWTM Certificate Tool for SSL, page

23 Chapter 2 Implementing SSL Support in the MWTM Step 5 Restart the MWTM client. The MWTM clients can now connect to the MWTM server by using SSL. All communication between the server and clients is encrypted. If an MWTM client, GTT editor (ITP only), or Address Table editor (ITP only) that is not SSL-enabled attempts to connect to an SSL-enabled MWTM server, the MWTM displays an appropriate warning message and opens the MWTM Client for Windows page. You can then download and install a new MWTM SSL module for the client to use to connect to that MWTM server. If the client is SSL-enabled but does not have the correct certificate, the MWTM displays an appropriate warning message and opens the MWTM Server SSL Certificate page. You can then download the signed SSL certificate in X.509 format to the client. Downloading the MWTM SSL Module for Windows Using the Web Interface To install the MWTM SSL module on a Windows system from the MWTM web interface: Step 1 From your browser, go to the URL for the MWTM Homepage: where your_mwtm_server is the name or IP address of the MWTM server and 1774 is the web port being used by the MWTM (1774 is the default port number.) If you do not know the name or web port of the MWTM server, contact the system administrator who installed the MWTM server software. The MWTM web interface home page appears. Click Download Windows Client. Ensure that your browser is pointed to an MWTM, SSL-enabled server. Right-click Download SSL Module for MWTM Client on Windows XP and choose the Save Link As or Save Target As option. If you are using Internet Explorer, change the.zip extension to.jar during the Save Target As option. Step 4 Step 5 When queried, save the file under <Installed Drive>:\Program Files\Cisco Systems\MWTMClient\lib where <Installed Drive> is the disk on which the MWTM client is installed. You are prompted to launch the client, then download the self-signed SSL certificate (follow the subsequent procedures). Downloading the Self-Signed SSL Certificate from the MWTM Server If you have implemented Secure Sockets Layer (SSL) support in your MWTM system, you can download the MWTM server s signed SSL certificate to all remote MWTM clients that connect to the server using SSL. To download the certificate from the MWTM Server SSL Certificate page, use the following procedure on each remote MWTM client: 2-23

24 Implementing SSL Support in the MWTM Chapter 2 Step 1 Step 4 In a web browser, enter the following URL: where server_name is the name or IP address of the server on which the MWTM server is running and 1774 is the Web port being using by the MWTM (1774 is the default port number.) If you do not know the name or Web port of the MWTM server, contact the system administrator who installed the MWTM server software. The Server SSL Certificate page appears. Right-click Download Server SSL Certificate. Select Save Link As (or Save Target As) from the right-click menu. Select a directory in which to save the certificate (server.crt), and click Save. The MWTM downloads the server.crt file into the specified directory. Launching the MWTM Certificate Tool for SSL If you have implemented Secure Sockets Layer (SSL) support in your MWTM system, you can launch the MWTM Certificate Tool for SSL. The MWTM Certificate Tool dialog box lists all SSL certificates that the MWTM client imported. In this dialog box, you specify whether to import, export, and display detailed information about SSL certificates. To launch the MWTM SSL Certificate Tool, use one of the following procedures: In Solaris, log in as the root user and enter the following commands: cd /opt/cscosgm/bin./mwtm certgui For more information, see mwtm certgui, page B-13. In Windows, choose Start > Programs > Cisco MWTM Client > MWTM SSL Certificate Tool. The MWTM displays the MWTM Certificate Tool dialog box. For each SSL certificate, the MWTM Certificate Tool dialog box displays: Field or Button Issued to Issued by Expiration Date Import Export Remove Details Description Hostname of the MWTM server to which the SSL certificate was issued. Certificate authority (CA) that issued the SSL certificate. Self-signed SSL certificates display the hostname of the MWTM server. Date on which the SSL certificate expires. Displays the Open dialog box for an SSL certificate, which you use to import SSL certificates (for details, see Importing an SSL Certificate to an MWTM Client, page 2-25). Displays the Save dialog box for an SSL certificate, which you use to export the selected SSL certificate. Removes the selected SSL certificate from the table. Displays the Certificate Information dialog box, which provides detailed information about the selected certificate. 2-24

25 Chapter 2 Implementing SSL Support in the MWTM Field or Button Exit Help Description Closes the MWTM Certificate Tool dialog box. Displays online help for the current window. Importing an SSL Certificate to an MWTM Client If you have implemented Secure Sockets Layer (SSL) support in your MWTM system, you can import the MWTM server s self-signed SSL certificate, or a CA-signed SSL certificate, to all remote MWTM clients that connect to the server using SSL. If you are using a Solaris client, you can import by using the MWTM SSL Certificate Tool as described in this section, or the CLI command mwtm certtool (for details, see mwtm certtool, page B-14). If you are using a Windows client, you must use the MWTM SSL Certificate Tool. To import an SSL certificate, launch the MWTM SSL Certificate Tool, as described in Launching the MWTM Certificate Tool for SSL, page 2-24, then click Import. The MWTM displays the Open dialog box for SSL certificates. Use the Open dialog box to locate the SSL certificate that you want to import. The Open dialog box contains: Field or Button Look In File Name Files of Type Up One Level Desktop Description Click to select the directory in which you want to find the SSL certificate. Accept the default directory, or select a new directory from the drop-down list box. For a self-signed certificate, locate the directory in which you downloaded the certificate. Enter a name for the SSL certificate, or select a file from those listed in the Open field. The MWTM displays the name of the certificate in the File Name field. Specifies the type of file to display, and displays all files of that type in the selected directory. For SSL certificates, this field displays All files, which means files of all types appear in the table. Displays the subfolders and files that are in the folder that is up one level from the currently visible folder. Displays the subfolders and files that are on your workstation desktop. Creates a new subfolder in the visible folder. Create New Folder List Displays only icons for subfolders and files. Open Cancel Details Displays detailed information for subfolders and files, including their size, type, date they were last modified, and so on. Imports the file, closes the Open dialog box for an SSL certificate, and populates the MWTM Certificate Tool dialog box with the SSL certificate s information. Closes the Open dialog box for an SSL certificate without importing the file. 2-25

Configuring Security. Configuring User Access CHAPTER

Configuring Security. Configuring User Access CHAPTER 2 CHAPTER Before you set up your server for discovering, monitoring, and configuring your Cisco network, you need to make some decisions about the level of security you desire in your network management.

More information

Configuring Security. Configuring User Access CHAPTER

Configuring Security. Configuring User Access CHAPTER 2 CHAPTER Before you set up your server for discovering, monitoring, and configuring your Cisco network, you need to make some decisions about the level of security you desire in your network management.

More information

Implementing Secure User Access, page 3-2 Creating Secure Passwords, page 3-6 Configuring Prime Performance Manager User Account Levels, page 3-6

Implementing Secure User Access, page 3-2 Creating Secure Passwords, page 3-6 Configuring Prime Performance Manager User Account Levels, page 3-6 3 CHAPTER Before you set up your server for discovering, monitoring, and configuring your Cisco network, you need to make some decisions about the level of security you need in your network monitoring.

More information

Troubleshooting the MWTM and the Network

Troubleshooting the MWTM and the Network APPENDIXD This appendix provides this information for troubleshooting basic Cisco Mobile Wireless Transport Manager (MWTM) network problems. This appendix contains: Clearing a Locked-Up MWTM Display, page

More information

Setting Up Your Server

Setting Up Your Server 3 CHAPTER This section contains: Importing SNMP Community Names from CiscoWorks (Solaris Only), page 3-2 Changing MWTM Server Poller Settings, page 3-2 Changing the Message Display, page 3-4 Setting the

More information

Configuring MWTM to Run with Various Networking Options

Configuring MWTM to Run with Various Networking Options APPENDIXH Configuring MWTM to Run with Various Networking Options In addition to running on standard IP-connected networks, the Cisco Mobile Wireless Transport Manager (MWTM) has the flexibility to adapt

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Editing ITP MLR Address Table Files

Editing ITP MLR Address Table Files 16 CHAPTER You use the Cisco Mobile Wireless Transport Manager (MWTM) to configure Multi-Layer Routing (MLR) address table files by using the MWTM Address Table Editor. You can: Create new address table

More information

ConnectUPS-X / -BD /-E How to use and install SSL, SSH

ConnectUPS-X / -BD /-E How to use and install SSL, SSH ConnectUPS-X /-BD /-E product family Root CA Certificate installation Rev. B Page 1/16 Index 1. How to use and install SSL (Secure Socket Layer)...3 1.1. General Certificate warning message if not installed...3

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM

Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM Document ID: 70791 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Configure

More information

NNMi Integration User Guide for CiscoWorks Network Compliance Manager 1.6

NNMi Integration User Guide for CiscoWorks Network Compliance Manager 1.6 NNMi Integration User Guide for CiscoWorks Network Compliance Manager 1.6 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Cisco Prime Optical 9.5 Basic External Authentication

Cisco Prime Optical 9.5 Basic External Authentication Cisco Prime Optical 9.5 Basic External Authentication June 6, 2012 This document describes the basic external authentication functionality in Cisco Prime Optical 9.5 running on a Solaris server. External

More information

Installing Essentials

Installing Essentials CHAPTER 1 This chapter describes installing Resource Manager Essentials 3.2 on a Windows system. It consists of: Product Overview Installation Overview Preparing to Install Essentials Importing Data Manually

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information

Installing AX Server with PostgreSQL (multi-server)

Installing AX Server with PostgreSQL (multi-server) Installing AX Server with PostgreSQL (multi-server) Version: 13 Published: Wednesday, November 29, 2017 ACL Services Ltd. 2017 Table of contents Table of contents Table of contents 3 Introduction 7 Intended

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Using Integration Utility

Using Integration Utility CHAPTER 3 CiscoWorks Integration Utility downloads Network Management Integration Data Bundle (NMIDB) and integrates LAN Management Solutions (LMS) applications, icons, MIBs, and traps with third-party

More information

Upgrading Software and Firmware

Upgrading Software and Firmware APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.1.0, page B-2 Upgrading

More information

Cisco CTL Client Setup

Cisco CTL Client Setup This chapter provides information about Cisco CTL client setup. About, page 2 Addition of Second SAST Role in the CTL File for Recovery, page 2 Cluster Encryption Configuration Through CLI, page 3 Remove

More information

ehealth SPECTRUM Integration

ehealth SPECTRUM Integration User Guide March 2007 ehealth SPECTRUM Integration Whether you are a large enterprise or a service provider, your operations team faces a significant challenge maintaining critical service levels across

More information

Installing the Management Software

Installing the Management Software To install the software for the first time, or if you want to update or reinstall the software, access the supervisor module with a web browser. Click the Install links on the web page that is displayed.

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

Upgrading the Cisco ONS CL to Release 7.0

Upgrading the Cisco ONS CL to Release 7.0 This document explains how to upgrade Cisco ONS 15310-CL Cisco Transport Controller (CTC) software from Release 5.x or Release 6.x to Release 7.0.x, or from Release 7.0.x to a later maintenance release

More information

Creating and Installing SSL Certificates (for Stealthwatch System v6.10)

Creating and Installing SSL Certificates (for Stealthwatch System v6.10) Creating and Installing SSL Certificates (for Stealthwatch System v6.10) Copyrights and Trademarks 2017 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING THE

More information

Managing GSS Devices from the GUI

Managing GSS Devices from the GUI CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

Getting Started Using Cisco License Manager

Getting Started Using Cisco License Manager CHAPTER 5 This chapter provides information about the initial setup of Cisco License Manager and an overview of recommended steps to quickly add users and devices and obtain and deploy licenses. This chapter

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

Manage Your Inventory

Manage Your Inventory About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 2 Display Information About Your Inventory, on page 2 Types of Devices in the DNA Center Inventory, on page 6

More information

Configuring SGM for Your Network

Configuring SGM for Your Network CHAPTER 5 This chapter provides the following information about configuring SGM to better suit your needs: Importing SNMP Community Names from CiscoWorks2000 (Solaris Only), page 5-2 Retaining Unknown

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Accessing SGM Data from a Web Browser

Accessing SGM Data from a Web Browser CHAPTER 7 Accessing SGM Data from a Web Browser This chapter provides information about accessing SGM data from the SGM server home page, using a Web browser. This chapter includes the following sections:

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

User Inputs for Installation

User Inputs for Installation APPENDIXA This appendix provides information on the user inputs during LMS 4.1 installation. Note For information on the Installation of LMS 4.1, see Performing Installation of LMS 4.1. This appendix contains:

More information

Microsoft Dynamics GP Web Client Installation and Administration Guide For Service Pack 1

Microsoft Dynamics GP Web Client Installation and Administration Guide For Service Pack 1 Microsoft Dynamics GP 2013 Web Client Installation and Administration Guide For Service Pack 1 Copyright Copyright 2013 Microsoft. All rights reserved. Limitation of liability This document is provided

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Accessing Data from the Web Interface

Accessing Data from the Web Interface 11 CHAPTER This chapter provides information about accessing Cisco Mobile Wireless Transport Manager (MWTM) data from the MWTM web interface by using a web browser. This chapter contains: Supported Browsers,

More information

User Tracking Utility

User Tracking Utility APPENDIXB CiscoWorks is a Windows desktop utility that provides quick access to useful information about users or hosts discovered by LMS. UTU comprises a server-side component and a client utility. To

More information

Upgrading the Server Software

Upgrading the Server Software APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.5.0, page B-2 Obtaining

More information

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at Document Date: May 16, 2017 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

Getting Started with the VQE Startup Configuration Utility

Getting Started with the VQE Startup Configuration Utility CHAPTER 2 Getting Started with the VQE Startup Configuration Utility This chapter explains how to use the Cisco VQE Startup Configuration Utility to perform the initial configuration tasks needed to get

More information

ehealth SPECTRUM Integration

ehealth SPECTRUM Integration User Guide May 2006 ehealth SPECTRUM Integration Whether you are a large enterprise or a service provider, your operations team faces a significant challenge maintaining critical service levels across

More information

Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1

Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1 Quick Start Guide Cisco Craft Works Interface Quick Start Guide Cisco IOS XR Software Release 3.2 1 Introduction 2 About the CWI 3 Getting Started 4 Setting Up the Router and CWI Client 5 Getting Started

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface

Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Release 7.1 Revised: March 5, 2013 1:53 pm This document describes the

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, page 1 with Cisco Unified Communications Manager Task List, page 1 for Contact Searches on XMPP Clients, page 6 LDAP Server Name, Address, and Profile

More information

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

CHAPTER. Introduction

CHAPTER. Introduction CHAPTER 1 Cisco Unified Communications Manager (formerly Cisco Unified CallManager) serves as the software-based call-processing component of the Cisco Unified Communications family of products. A wide

More information

Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication

Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication Document ID: 43486 Contents Introduction Prerequisites Requirements Components Used Background Theory Conventions Network Diagram

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Use a class C setting for maximum security. The class C setting is Click RoomWizard Setup.

Use a class C setting for maximum security. The class C setting is Click RoomWizard Setup. Use a class C setting for maximum security. The class C setting is 255.255.255.0. 2 Click RoomWizard Setup. The Default Gateway is the IP address of the router or gateway that provides internet access.

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,

More information

Secure ACS for Windows v3.2 With EAP TLS Machine Authentication

Secure ACS for Windows v3.2 With EAP TLS Machine Authentication Secure ACS for Windows v3.2 With EAP TLS Machine Authentication Document ID: 43722 Contents Introduction Prerequisites Requirements Components Used Background Theory Conventions Network Diagram Configuring

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Forescout. Configuration Guide. Version 4.2

Forescout. Configuration Guide. Version 4.2 Forescout Version 4.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Setting Up Essentials

Setting Up Essentials CHAPTER 4 Setting Up Essentials Now that you have installed Essentials, you need to perform some required administrator tasks. This chapter consists of the following sections: Quick Reference Accessing

More information

Connectware Manager Getting Started Guide

Connectware Manager Getting Started Guide Connectware Manager Getting Started Guide 90000699_B 2004, 2005 Digi International Inc. Digi, Digi International, the Digi logo, the Digi Connectware log, the Making Device Networking Easy logo, Digi

More information

Installing Prime Performance Manager

Installing Prime Performance Manager CHAPTER 2 The following topics tell you how to install and start Cisco Prime Performance Manager, and also how to verify the installation. Installing the Prime Performance Manager Gateway and Unit, page

More information

Installing the Cisco Prime Optical Client

Installing the Cisco Prime Optical Client CHAPTER 7 This chapter describes how to install and start the Cisco Prime Optical 9.3.1 client on Windows, Solaris, or Linux. When you install the Prime Optical client, you automatically install Cisco

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

GIGABYTE Remote Management Console User s Guide. Version: 1.0

GIGABYTE Remote Management Console User s Guide. Version: 1.0 GIGABYTE Remote Management Console User s Guide Version: 1.0 Table of Contents Using Your GIGABYTE Remote Management Console...2 Software Install...3 Prerequisites on remote management PC...3 Install Java

More information

Managing WCS User Accounts

Managing WCS User Accounts 7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,

More information

Understanding Basic Object Functions

Understanding Basic Object Functions 8 CHAPTER You can use the Cisco Mobile Wireless Transport Manager (MWTM) to view basic information about any discovered MWTM object, including its associated objects, status, and other important information.

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

Help on the SPECTRUM Control Panel

Help on the SPECTRUM Control Panel Help on the SPECTRUM Control Panel The SPECTRUM Control Panel is a convenient Point and Click interface that provides facilities that let you configure SPECTRUM resources, start and stop SpectroSERVER,

More information

UCS Manager Communication Services

UCS Manager Communication Services Communication Protocols, page 1 Communication Services, page 1 Non-Secure Communication Services, page 3 Secure Communication Services, page 5 Network-Related Communication Services, page 12 Communication

More information

System Setup. Accessing the Administration Interface CHAPTER

System Setup. Accessing the Administration Interface CHAPTER CHAPTER 3 The system can be configured through the web interface to provide the networking configuration for the appliance and other system settings that are important such as time and SSL certificate.

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

Configuring and Using your Nationwide Extranet Virtual Machine

Configuring and Using your Nationwide Extranet Virtual Machine Configuring and Using your Nationwide Extranet Virtual Machine V8.16.17 OVERVIEW To access your Nationwide email, you must configure your PC. This is required whenever you are accessing from a new machine

More information

System Administration

System Administration Most of SocialMiner system administration is performed using the panel. This section describes the parts of the panel as well as other administrative procedures including backup and restore, managing certificates,

More information

Cisco recommends that you have knowledge of FireSIGHT Management Center, Sourcefire User Agent, and Active Directory.

Cisco recommends that you have knowledge of FireSIGHT Management Center, Sourcefire User Agent, and Active Directory. Contents Introduction Prerequisites Installation Requirements Installation of Sourcefire User Agent Uninstallation of the Sourcefire User Agent Troubleshoot Uninstallation Issues Symptom Solution Introduction

More information

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

Manage Your Device Inventory

Manage Your Device Inventory About Device Inventory, page 1 Device Inventory and Cisco ISE Authentication, page 7 Device Inventory Tasks, page 7 Add a Device Manually, page 8 Filter Devices, page 12 Change Devices Layout View, page

More information

Database Migration Guide

Database Migration Guide Database Migration Guide Learn how to migrate a WhatsUp Gold database from Microsoft SQL Server 2005 Express Edition to Microsoft SQL Server 2005 or 2008 Enterprise, Standard, or Workgroup Editions. Contents

More information

Manage Your Inventory

Manage Your Inventory About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 6 Add a Device Manually, on page 7 Integrate Meraki Dashboard, on page 10 Filter Devices, on page 11 Change Devices

More information

The Cisco HCM-F Administrative Interface

The Cisco HCM-F Administrative Interface CHAPTER 5 This chapter contains information on the following topics: Overview of Cisco HCM-F Administrative Interface, page 5-1 Browser Support, page 5-2 Login and Logout, page 5-4 Online Help, page 5-5

More information

AVWorks. Installer/User Guide

AVWorks. Installer/User Guide AVWorks Installer/User Guide INSTRUCTIONS This symbol is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the appliance.

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

Installing Essentials

Installing Essentials CHAPTER 1 This chapter describes how to install and uninstall Essentials, including upgrades and reinstallation. You must install CiscoWorks2000 CD One before you can install Resource Manager Essentials.

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

QUICK START GUIDE Cisco Physical Access Manager Quick Start Guide, Release 1.4.1

QUICK START GUIDE Cisco Physical Access Manager Quick Start Guide, Release 1.4.1 QUICK START GUIDE Cisco Physical Access Manager Quick Start Guide, Release 1.4.1 1 Before You Begin 2 Installing the Appliance 3 Logging In to the Cisco Physical Access Manager 4 Entering the Initial Configuration

More information

Accessing Data from the Web Interface

Accessing Data from the Web Interface 5 CHAPTER This chapter provides information about accessing Prime Performance Manager data from Prime Performance Manager web interface. This chapter contains: Supported Browsers, page 5-1 Accessing Prime

More information

Genesys Security Deployment Guide. What You Need

Genesys Security Deployment Guide. What You Need Genesys Security Deployment Guide What You Need 12/27/2017 Contents 1 What You Need 1.1 TLS Certificates 1.2 Generating Certificates using OpenSSL and Genesys Security Pack 1.3 Generating Certificates

More information

Cisco Transport Manager Release 9.2 Basic External Authentication

Cisco Transport Manager Release 9.2 Basic External Authentication Cisco Transport Manager Release 9.2 Basic External Authentication August 23, 2010 This document describes the basic external authentication functionality in Cisco Transport Manager (CTM) Release 9.2. Contents

More information

Installing and Configuring Cisco Unified Real-Time Monitoring Tool

Installing and Configuring Cisco Unified Real-Time Monitoring Tool CHAPTER 2 Installing and Configuring Cisco Unified Real-Time Monitoring Tool You can install Cisco Unified Real-Time Monitoring Tool (RTMT), which works for resolutions 800*600 and above, on a computer

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.7 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

Certificate Renewal on Cisco Identity Services Engine Configuration Guide

Certificate Renewal on Cisco Identity Services Engine Configuration Guide Certificate Renewal on Cisco Identity Services Engine Configuration Guide Document ID: 116977 Contributed by Roger Nobel, Cisco TAC Engineer. Jun 26, 2015 Contents Introduction Prerequisites Requirements

More information

EMC Ionix Network Configuration Manager Version 4.1.1

EMC Ionix Network Configuration Manager Version 4.1.1 EMC Ionix Network Configuration Manager Version 4.1.1 RSA Token Service Installation Guide 300-013-088 REVA01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com

More information

Upgrading Prime Optical

Upgrading Prime Optical CHAPTER 6 You cannot perform a full upgrade from an earlier Cisco Transport Manager (CTM) or Prime Optical release. This section describes how to use the Cisco Prime Optical 9.8 Data Migrator wizard to

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information